Home>Articles

Dealing with Impairments in Wireless Communication

Wireless communication is a critical discipline of electrical engineering and computer science. In this excerpt, explore channel impairments and algorithms for estimating unknown parameters to remove their effects.

Save 35% off the list price* of the related book or multi-format eBook (EPUB + MOBI + PDF) with discount code文章.
* Seeinformit.com/terms

This chapter is from the book

Communication in wireless channels is complicated, with additional impairments beyond AWGN and more elaborate signal processing to deal with those impairments. This chapter develops more complete models for wireless communication links, including symbol timing offset, frame timing offset, frequency offset, flat fading, and frequency-selective fading. It also reviews propagation channel modeling, including large-scale fading, small-scale fading, channel selectivity, and typical channel models.

We begin the chapter by examining the case of frequency-flat wireless channels, including topics such as the frequency-flat channel model, symbol synchronization, frame synchronization, channel estimation, equalization, and carrier frequency offset correction. Then we consider the ramifications of communication in considerably more challenging frequency-selective channels. We revisit each key impairment and present algorithms for estimating unknown parameters and removing their effects. To remove the effects of the channel, we consider several types of equalizers, including a least squares equalizer determined from a channel estimate, an equalizer directly determined from the unknown training, single-carrier frequency-domain equalization (SC-FDE), and orthogonal frequency-division multiplexing (OFDM). Since equalization requires an estimate of the channel, we also develop algorithms for channel estimation in both the time and frequency domains. Finally, we develop techniques for carrier frequency offset correction and frame synchronization. The key idea is to use a specially designed transmit signal to facilitate frequency offset estimation and frame synchronization prior to other functions like channel estimation and equalization. The approach of this chapter is to consider specific algorithmic solutions to these impairments rather than deriving optimal solutions.

We conclude the chapter with an introduction to propagation channel models. Such models are used in the design, analysis, and simulation of communication systems. We begin by describing how to decompose a wireless channel model into two submodels: one based on large-scale variations and one on small-scale variations. We then introduce large-scale models for path loss, including the log-distance and LOS/NLOS channel models. Next, we describe the selectivity of a small-scale fading channel, explaining how to determine if it is frequency selective and how quickly it varies over time. Finally, we present several small-scale fading models for both flat and frequency-selective channels, including some analysis of the effects of fading on the average probability of symbol error.

5.1 Frequency-Flat Wireless Channels

In this section, we develop the frequency-flat AWGN communication model, using a single-path channel and the notion of the complex baseband equivalent. Then we introduce several impairments and explain how to correct them. Symbol synchronization corrects for not sampling at the correct point, which is also known as symbol timing offset. Frame synchronization finds a known reference point in the data—for example, the location of a training sequence—to overcome the problem of frame timing offset. Channel estimation is used to estimate the unknown flat-fading complex channel coefficient. With this estimate, equalization is used to remove the effects of the channel. Carrier frequency offset synchronization corrects for differences in the carrier frequencies between the transmitter and the receiver. This chapter provides a foundation for dealing with impairments in the more complicated case of frequency-selective channels.

5.1.1 Discrete-Time Model for Frequency-Flat Fading

The wireless communication channel, including all impairments, is not well modeled simply by AWGN. A more complete model also includes the effects of the propagation channel and filtering in the analog front end. In this section, we consider a single-path channel with impulse response

05equ01.jpg

Based on the derivations in Section 3.3.3 and Section 3.3.4, this channel has a complex baseband equivalent given by

05equ02.jpg

and pseudo-baseband equivalent channel

05equ03.jpg

See Example 3.37 and Example 3.39 to review this calculation. TheBsinc(t) term is present because the complex baseband equivalent is a baseband bandlimited signal. In the frequency domain

05equ04.jpg

we observe that |H(f)| is a constant forf∈ [−B/2,B/2]. This channel is said to be frequency flat because it is constant over the bandwidth of interest to the signal. Channels that consist of multipaths can be approximated as frequency flat if the signal bandwidth is much less than the coherence bandwidth, which is discussed further in Section 5.8.

Now we incorporate this channel into our received signal model. The channel in (5.2) convolves with the transmitted signal prior to the noise being added at the receiver. As a result, the complex baseband received signal prior to matched filtering and sampling is

05equ05.jpg

To ensure thatr(t) is bandlimited, henceforth we suppose that the noise has been lowpass filtered to have a bandwidth ofB/2. For simplicity of notation, and to be consistent with the discrete-time representation, we lete221-1.jpgand write

05equ07.jpg

The factor ofe221-2.jpgis included inhsince only the combined scaling is important from the perspective of receiver design. Matched filtering and sampling at the symbol rate give the received signal

05equ08.jpg

whereg(t) is a Nyquist pulse shape. Compared with the AWGN received signal modely[n] =s[n] +υ[n], there are several sources of distortion, which must be recognized and corrected.

One impairment is caused by symbol timing error. Suppose that τdis a fraction of a symbol period, that is, τd∈ [0,T). This models the effect of sample timing error, which happens when the receiver does not sample at precisely the right point in time. Under this assumption

05equ09.jpg

Intersymbol interference is created when the Nyquist pulse shape is not sampled exactly atnT, sinceg(nT+ τd) is not generally equal to δ[n]. Correcting for this fractional delay requiressymbol synchronization,equalization, or a more complicated detector.

A second impairment occurs with larger delays. For illustration purposes, suppose that τd=dTfor some integerd. This is the case where symbol timing has been corrected but an unknown propagation delay, which is a multiple of the symbol period, remains. Under this assumption

05equ10.jpg

基本上整数补偿元素创建一个不匹配een the indices of the transmitted and received symbols. Frame synchronization is required to correct this frame timing error impairment.

Finally, suppose that the unknown delay τdhas been completely removed so that τd= 0. Then the received signal is

05equ13.jpg

Sampling and removing delay leaves distortion due to the attenuation and phase shift inh. Dealing withhrequires either a specially designed modulation scheme, like DQPSK (differential quadrature phase-shift keying), or channel estimation and equalization.

It is clear that amplitude, phase, and delay if not compensated can have a drastic impact on system performance. As a consequence, every wireless system is designed with special features to enable these impairments to be estimated or directly removed in the receiver processing. Most of this processing is performed on small segments of data called bursts, packets, or frames. We emphasize this kind of batch processing in this book. Many of the algorithms have adaptive extensions that can be applied to continually estimate impairments.

5.1.2 Symbol Synchronization

The purpose of symbol synchronization, or timing recovery, is to estimate and remove the fractional part of the unknown delay τd, which corresponds to the part of the error in [0,T). The theory behind these algorithms is extensive and their history is long [309, 226, 124]. The purpose of this section is to present one of the many algorithm approaches for symbol synchronization in complex pulse-amplitude modulated systems.

Philosophically, there are several approaches to synchronization as illustrated inFigure 5.1. There is a pure analog approach, a combined digital and analog approach where digital processing is used to correct the analog, and a pure digital approach. Following the DSP methodology, this book considers only the case of pure digital symbol synchronization.

FIGURE 5.1

FIGURE 5.1Different options for correcting symbol timing. The bottom approach relies only on DSP.

We consider two different strategies for digital symbol synchronization, depending on whether the continuous-to-discrete converter can be run at a low sampling rate or a high sampling rate:

  • The oversampling method, illustrated inFigure 5.2, is suitable when the oversampling factorMrxis large and therefore a high rate of oversampling is possible. In this case the synchronization algorithm essentially chooses the best multiple ofT/Mrxand adds a suitable integer delayk* prior to downsampling.

  • The resampling method is illustrated inFigure 5.3. In this case a resampler, or interpolator, is used to effectively create an oversampled signal with an effective sample period ofT/Mrxeven if the actual sampling is done with a period less thanT/Mrx但still satisfying Nyquist. Then, as with the oversampling method, the multiple ofT/Mrxis estimated and a suitable integer delayk* is added prior to the downsampling operation.

FIGURE 5.2

FIGURE 5.2Oversampling method suitable whenMrxis large

FIGURE 5.3

FIGURE 5.3Resampling or interpolation method suitable whenMrxis small, for example,N= 2

A proper theoretical approach for solving for the best of τdwould be to use estimation theory. For example, it is possible to solve for the maximum likelihood estimator. For simplicity, this section considers an approach based on a cost function known as the maximum output energy (MOE) criterion, the same approach as in [169]. There are other approaches based on maximum likelihood estimation such as the early-late gate approach. Lower-complexity implementations of what is described are possible that exploit filter banks; see, for example, [138].

First we compute the energy output as a way to justify each approach for timing synchronization. Denote the continuous-time output of the matched filter as

05equ14.jpg

The output energy after sampling bynT+ τ is

05equ15.jpg

Suppose that τd=dT+ τfracande224-1.jpg; then

05equ17.jpg

with a change of variables. Therefore, while the delay τ can take an arbitrary positive value, only the offset that corresponds to the fractional delay has an impact on the output energy.

The maximum output energy approach to symbol timing attempts to find the τ that maximizesJMOE(τ) where τ ∈ [0,T]. The maximum output energy solution is

05equ19.jpg

The rationale behind this approach is that

05equ20.jpg

where the inequality is true for most common pulse-shaping functions (but not for arbitrarily chosen pulse shapes). Thus the unique maximum ofJMOE(τ) corresponds to τ = τd. The values ofJMOE(τ) are plotted inFigure 5.4提出了余弦脉冲波形。(5.2的证明0) for sinc and raised cosine pulse shapes is established in Example 5.1 and Example 5.2.

FIGURE 5.4

FIGURE 5.4Plot ofJMOE(τ) for τ ∈ [−T/2,T/2], in the absence of noise, assuming a raised cosine pulse shape (4.73). The x-axis is normalized toT. As the rolloff value of the raised cosine is increased, the output energy peaks more, indicating that the excess bandwidth provided by choosing larger values of rolloff α translates into better symbol timing using the maximum output energy cost function.

Example 5.1Show that the inequality in (5.20) is true for sinc pulse shapes.

Answer: For convenience denote

05equ21.jpg

wheree225-1.jpg. Letg(t) = sinc(t+a) andg[m] =g(mT) = sinc(m+a), and letg(f) andg(ej2πf) be the CTFT ofg(t) and DTFT ofg[m] respectively. Theng(f) =ej2πafrect(f) and

05equ22.jpg

By Parseval’s theorem for the DTFT we have

05equ24.jpg

where the inequality follows because |∑ai| ≤ ∑ |ai|. Therefore,

05equ31.jpg

Example 5.2Show that the MOE inequality in (5.20) holds for raised cosine pulse shapes.

Answer: The raised cosine pulse

05equ32.jpg

is a modulated version of the sinc pulse shape. Since

05equ33.jpg

it follows that

05equ34.jpg

and the result from Example 5.1 can be used.

Now we develop the direct solution to maximizing the output energy, assuming the receiver architecture with oversampling as in Figure 4.10. Letr[n] denote the signal after oversampling or resampling, assuming there areMrxsamples per symbol period. Let the output of the matched receiver filter prior to downsampling at the symbol rate be

05equ35.jpg

We use this sampled signal to compute a discrete-time version ofJMOE(τ) given by

05equ36.jpg

wherekis the sample offset between 0, 1, . . . ,Mrx− 1 corresponding to an estimate of the fractional part of the timing offset given bykT/Mrx. To develop a practical algorithm, we replace the expectation with a time average overPsymbols, thanks to ergodicity, so that

05equ37.jpg

Looking for the maximizer ofJMOE,e[k] overk= 0, 1, . . . ,Mrx− 1 gives the optimum samplek* and an estimate of the symbol timing offsetk*T/Mrx.

The optimum correction involves advancing the received signal byk* samples prior to downsampling. Essentially, the synchronized data ise227-1.jpg. Equivalently, the signal can be delayed byk* −Mrxsamples, since subsequent signal processing steps will in any case correct for frame synchronization.

The main parameter to be selected in the symbol timing algorithms covered in this section is the oversampling factorMrx. This decision can be based on the residual ISI created because the symbol timing is quantized. Using the SINR from (4.56), assumingh是known perfectly, matched filtering at the receiver, and a maximum symbol timing offsetT/2Mrx, then

05equ38.jpg

This value can be used, for example, with the probability of symbol error analysis in Section 4.4.5 to select a value ofMrxsuch that the impact of symbol timing error is acceptable, depending on the SNR and target probability of symbol error. An illustration is provided inFigure 5.5for the case of 4-QAM. In this case, a value ofMrx= 8 leads to less than 1dB of loss at a symbol error rate of 10−4.

FIGURE 5.5

FIGURE 5.5Plot of the exact symbol error rate for 4-QAM from (4.147), substituting SINR for SNR, withe228-2.jpgfor different values ofMrxin (5.38), assuming a raised cosine pulse shape with α = 0.25. With enough oversampling, the effects of timing error are small.

5.1.3 Frame Synchronization

The purpose of frame synchronization is to resolve multiple symbol period delays, assuming that symbol synchronization has already been performed. Letddenote the remaining offset whered= τd/Tk* /Mrx, assuming the symbol timing offset was corrected perfectly. Given that, ISI is eliminated and

05equ39.jpg

To reconstruct the transmitted bit sequence it is necessary to know “where the symbol stream starts.” As with symbol synchronization, there is a great deal of theory surrounding frame synchronization [343, 224, 27]. This section considers one common algorithm for frame synchronization in flat channels that exploits the presence of a known training sequence, inserted during a training phase.

Most wireless systems insert reference signals into the transmitted waveform, which are known by the receiver. Known information is often called a training sequence or a pilot symbol, depending on how the known information is inserted. For example, a training sequence may be inserted at the beginning of a transmission as illustrated inFigure 5.6, or a few pilot symbols may be inserted periodically. Most systems use some combination of the two where long training sequences are inserted periodically and shorter training sequences (or pilot symbols) are inserted more frequently. For the purpose of explanation, it is assumed that the desired frame begins at discrete timen= 0. The total frame length isNtot, including a lengthNtrtraining phase and anNtotNtrdata phase. Suppose thate228-1.jpgis the training sequence known at the receiver.

FIGURE 5.6

FIGURE 5.6A frame structure that consists of periodically inserted training and data

One approach to performing frame synchronization is to correlate the received signal with the training sequence to compute

05equ40.jpg

and then to find

05equ41.jpg

The maximization usually occurs by evaluatingR[n] over a finite set of possible values. For example, the analog hardware may have a carrier sense feature that can determine when there is a significant signal of interest. Then the digital hardware can start evaluating the correlation and looking for the peak. A threshold can also be used to select the starting point, that is, finding the first value ofnsuch that |R[n]| exceeds a target threshold. An example with frame synchronization is provided in Example 5.3.

Example 5.3Consider a system as described by (5.39) withe229-1.jpg,Ntr= 7, andNtot= 21 withd= 0. We assume 4-QAM for the data transmission and that the training consists of the Barker code of length 7 given bye229-2.jpg. The SNR is 5dB. We consider a frame snippet that consists of 14 data symbols, 7 training symbols, 14 data symbols, 7 training symbols, and 14 data symbols. InFigure 5.7, we plot |R[n]| computed from (5.40). There are two peaks that correspond to locations of our training data. The peaks happen at 21 and 42 as expected. If the snippet was delayed, then the peaks would shift accordingly.

FIGURE 5.7

FIGURE 5.7The absolute value of the output of a correlator for frame synchronization. The details of the simulation are provided in Example 5.3. Two correlation peaks are seen, corresponding to the location of the two training sequences.

A block diagram of a receiver including both symbol synchronization and frame synchronization operations is illustrated inFigure 5.8. The frame synchronization happens after the downsampling and prior to the symbol detection. Fixing the frame synchronization requires advancing the signal bye230-1.jpgsymbols.

FIGURE 5.8

FIGURE 5.8Receiver with symbol synchronization based on oversampling and frame synchronization

The frame synchronization algorithm may find a false peak if the data is the same as the training sequence. There are several approaches to avoid this problem. First, training sequences can be selected that have good correlation properties. There are many kinds of sequences known in the literature that have good autocorrelation properties [116, 250, 292], or periodic autocorrelation properties [70, 267]. Second, a longer training sequence may be used to reduce the likelihood of a false positive. Third, the training sequence can come from a different constellation than the data. This was used in Example 5.3 where a BPSK training sequence was used but the data was encoded with 4-QAM. Fourth, the frame synchronization can average over multiple training periods. Suppose that the training is inserted everyNtotsymbols. Averaging overPperiods then leads to an estimate

05equ42.jpg

Larger amounts of averaging improve performance at the expense of higher complexity and more storage requirements. Finally, complementary training sequences can be used. In this case a pair of training sequences {t1[n]} and {t2[n]} are designed such thate230-2.jpghas a sharp correlation peak. Such sequences are discussed further in Section 5.3.1.

5.1.4 Channel Estimation

一旦帧同步和synchronizat象征ion are completed, a good model for the received signal is

05equ43.jpg

The two remaining impairments are the unknown flat channelhand the AWGNυ[n]. Becausehrotates and scales the constellation, the channel must be estimated and either incorporated into the detection process or removed via equalization.

The area of channel estimation is rich and the history long [40, 196, 369]. In general, a channel estimation problem is handled like any other estimation problem. The formal approach is to derive an optimal estimator under assumptions about the signal and noise. Examples include the least squares estimator, the maximum likelihood estimator, and the MMSE estimator; background on these estimators may be found in Section 3.5.

In this section we emphasize the use of least squares estimation, which is also the ML estimator when used for linear parameter estimation in Gaussian noise. To use least squares, we build a received signal model from (5.43) by exploiting the presence of the known training sequence fromn= 0, 1, . . . ,Ntr− 1. Stacking the observations in (5.43) into vectors,

05equ44.jpg

which becomes compactly

05equ45.jpg

We already computed the maximum likelihood estimator for a more general version of (5.46) in Section 3.5.3. The solution was the least squares estimate, given by

05equ46.jpg

Essentially, the least squares estimator correlates the observed data with the training data and normalizes the result. The denominator is just the energy in the training sequence, which can be precomputed and stored offline. The numerator is calculated as part of the frame synchronization process. Therefore, frame synchronization and channel estimation can be performed jointly. The receiver, including symbol synchronization, frame synchronization, and channel estimation, is illustrated inFigure 5.9.

FIGURE 5.9

FIGURE 5.9Receiver with symbol synchronization based on oversampling, frame synchronization, and channel estimation

Example 5.4In this example, we evaluate the squared error in the channel estimate. We consider a similar system to the one described in Example 5.3 with a lengthNtr= 7 Barker code used for a training sequence, and a least squares channel estimator as in (5.46). We perform a Monte Carlo estimate of the channel by generating a noise realization and estimating the channele232-1.jpgforn= 1, 2, . . . , 1000 realizations. InFigure 5.10, we evaluate the estimation error as a function of the SNR, which is defined ase232-2.jpg, and is 5dB in this example. We plot the error for one realization of a channel estimation, which is given bye232-3.jpg, and the mean squared error, which is given bye232-4.jpg. The plot shows how the estimation error, based both on one realization and on average, decreases with SNR.

FIGURE 5.10

FIGURE 5.10Estimation error as a function of SNR for the system in Example 5.4. The error estimate reduces as SNR increases.

Example 5.5In this example, we evaluate the squared error in the channel estimate for different lengths of 4-QAM training sequences, an SNR of 5dB, the channel as in Example 5.3, and a least squares channel estimator as in (5.46). We perform a Monte Carlo estimate of the squared error of one realization and the mean squared error, as described in Example 5.4. We plot the results inFigure 5.11, which show how longer training sequences reduce estimation error. Effectively, longer training increases the effective SNR through the addition of energy through coherent combining ine232-5.jpgand more averaging ine232-6.jpg.

FIGURE 5.11

FIGURE 5.11Estimation error as a function of the training length for the system in Example 5.5. The error estimate reduces as the training length increases.

5.1.5 Equalization

Assuming that channel estimation has been completed, the next step in the receiver processing is to use the channel estimate to perform symbol detection. There are two reasonable approaches; both involve assuming thate233-1.jpgis the true channel estimate. This is a reasonable assumption if the channel estimation error is small enough.

The first approach is to incorporatee233-2.jpginto the detection process. Replacinge233-3.jpgbyhin (4.105), then

05equ48.jpg

Consequently, the channel estimate becomes an input into the detector. It can be used as in (5.48) to scale the symbols during the computation of the norm, or it can be used to create a new constellatione233-4.jpgand detection performed using the scaled constellation as

05equ49.jpg

The latter approach is useful whenNtotis large.

An alternative approach to incorporating the channel into the ML detector is to remove the effects of the channel prior to detection. Fore233-5.jpg,

05equ50.jpg

The process of creating the signale234-1.jpgis an example of equalization. When equalization is used, the effects of the channel are removed fromy[n] and a standard detector can be applied to the result, leveraging constellation symmetries to reduce complexity. The receiver, including symbol synchronization, frame synchronization, channel estimation, and equalization, is illustrated inFigure 5.9.

The probability of symbol error with channel estimation can be computed by treating the estimation error as noise. Lete234-2.jpgwheree234-3.jpgis the estimation error. For a given channelhand estimatee233-2.jpgthe equalized received signal is

05equ51.jpg

It is common to treat the middle interference term as additional noise. Moving the commone234-4.jpgto the numerator,

05equ53.jpg

This can be used as part of a Monte Carlo simulation to determine the impact of channel estimation. Since the receiver does not actually know the estimation error, it is also common to consider a variation of the SINR expression where the variance of the estimatee234-5.jpgis used in place of the instantaneous value (assuming that the estimator is unbiased so zero mean). Then the SINR becomes

05equ54.jpg

This expression can be used to study the impact of estimation error on the probability of error, as the mean squared error of the estimate is a commonly computed quantity. A comparison of the probability of symbol error for these approaches is provided in Example 5.6.

Example 5.6In this example we evaluate the impact of channel estimation error. We consider a system similar to the one described in Example 5.4 with a lengthNtr= 7 Barker code used for a training sequence, and a least squares channel estimator as in (5.46). We perform a Monte Carlo estimate of the channel by generating a noise realization and estimating the channele234-6.jpgforn= 1, 2, . . . , 1000 realizations. For each realization, we compute the error, insert into thee234-7.jpgin (5.53), and use that to compute the exact probability of symbol error from Section 4.4.5. We then average this over 1000 Monte Carlo simulations. We also compare inFigure 5.12with the probability of error assuming no estimation error with SNR |h|2Ex/Noand with the probability of error computed using the average error from the SINR in (5.54). We see in this example that the loss due to estimation error is about 1dB and that there is little difference in the average probability of symbol error and the probability of symbol error computed using the average estimation error.

FIGURE 5.12

FIGURE 5.12The probability of symbol error with 4-QAM and channel estimation using a lengthNtr= 7 training sequence. The probability of symbol error with no channel estimation error is compared with the average of the probability of symbol error including the instantaneous error, and the probability of symbol error using the average estimation error. There is little loss in using the average estimation error.

5.1.6 Carrier Frequency Offset Synchronization

Wireless communication systems use passband communication signals. They can be created at the transmitter by upconverting a complex baseband signal to carrierfcand can be processed at the receiver to produce a complex baseband signal by downconverting from a carrierfc. In Section 3.3, the process of upconversion to carrierfc, downconversion to baseband, and the complex equivalent notation were explained under the important assumption thatfc是known perfectly at both the transmitter and the receiver. In practice,fcis generated from a local oscillator. Because of temperature variations and the fact that the carrier frequency is generated by a different local oscillator and transmitter and receiver, in practicefcat the transmitter is not equal toe235-1.jpgat the receiver as illustrated inFigure 5.13. The difference between the transmitter and the receivere236-1.jpgis the carrier frequency offset (or simply frequency offset) and is generally measured in hertz. In device specification sheets, the offset is often measured as |fe|/fcand is given in units of parts per million. In this section, we derive the system model for carrier frequency offset and present a simple algorithm for carrier frequency offset estimation and correction.

FIGURE 5.13

FIGURE 5.13Abstract block diagram of a wireless system with different carrier frequencies at the transmitter and the receiver

Let

05equ55.jpg

be the passband signal generated at the transmitter. Let the observed passband signal at the receiver at carrierfcbe

05equ56.jpg

wherer(t) =ri(t) + jrq(t) is the complex baseband signal that corresponds torp(t) and we use the fact thate236-2.jpgfor the last step. Now suppose thatrp(t) is downconverted using carriere236-3.jpgto produce a new signalr′(t). Then the extracted complex baseband signal is (ignoring noise)

05equ59.jpg

Focusing on the last term in (5.59) withe236-4.jpg, then

05equ60.jpg

Substituting inrp(t) from (5.58),

05equ62.jpg

Lowpass filtering (assuming, strictly speaking, a bandwidth ofB+ |fe|) and correcting for the factor ofe237-1.jpgleaves the complex baseband equivalent

05equ63.jpg

Carrier frequency offset results in a rolling phase shift that happens after the convolution and depends on the difference in carrierfe. As the phase shift accumulates, failing to synchronize can quickly lead to errors.

Following the methodology of this book, it is of interest to formulate and solve the frequency offset estimation and correction problem purely in discrete time. To that end a discrete-time complex baseband equivalent model is required.

To formulate a discrete-time model, we focus on the sampled signal after matched filtering, still neglecting noise, as

05equ64.jpg

Suppose that the frequency offsetfeis sufficiently small that the variation over the duration ofgrx(t) can be assumed to be a constant; thene−j2πfeτgrx(τ) ≈grx(τ). This is reasonable since most of the energy in the matched filtergrx(t)通常是和谐rated over a few symbol periods. Assuming this holds,

05equ67.jpg

As a result, it is reasonable to model the effects of frequency offset as if they occurred on the matched filtered signal.

Now we specialize to the case of flat-fading channels. Substituting forr(t), adding noise, and sampling gives

05equ68.jpg

whereepsi.jpg=feTis the normalized frequency offset. Frequency offset introduces a multiplication by the discrete-time complex exponentialej2πfeTn.

To visualize the effects of frequency offset, suppose that symbol and frame synchronization has been accomplished and only equalization and channel estimation remain. Then the Nyquist property of the pulse shape can be exploited so that

05equ69.jpg

Notice that the transmit symbol is being rotated by exp(j2πepsi.jpgn). Asnincreases, the offset increases, and thus the symbol constellation rotates even further. The impact of this is an increase in the number of symbol errors as the symbols rotate out of their respective Voronoi regions. The effect is illustrated in Example 5.7.

Example 5.7Consider a system with the frequency offset described by (5.69). Suppose thatepsi.jpg= 0.05. InFigure 5.14, we plot a 4-QAM constellation at timesn= 0, 1, 2, 3. The Voronoi regions corresponding to the unrotated constellation are shown on each plot as well. To make seeing the effect of the rotation easier, one point is marked with anx. Notice how the rotations are cumulative and eventually the constellation points completely leave their Voronoi regions, which results in detection errors even in the absence of noise.

FIGURE 5.14

FIGURE 5.14The successive rotation of a 4-QAM constellation due to frequency offset. The Voronoi regions for each constellation point are indicated with the dashed lines. To make the effects of the rotation clearer, one of the constellation points is marked with anx.

Correcting for frequency offset is simple: just multiplyy[n] bye−j2πepsi.jpgn. Unfortunately, the offset is unknown at the receiver. The process of correcting forepsi.jpg是known as frequency offset synchronization. The typical method for frequency offset synchronization involves first estimating the offsete238-2.jpg, then correcting for it by forming the new sequencee238-1.jpg删除阶段。有几种不同t methods for correction; most employ a frequency offset estimator followed by a correction phase. Blind offset estimators use some general properties of the received signal to estimate the offset, whereas non-blind estimators use more specific properties of the training sequence.

Now we review two algorithms for correcting the frequency offset in a flat-fading channel. We start by observing that frequency offset does not impact symbol synchronization, since theej2πfeTncancels out the maximum output energy maximization caused by the magnitude function (see, for example, (5.15)). As a result, ISI cancels and a good model for the received signal is

05equ70.jpg

where the offsetepsi.jpg, the channelh, and the frame offsetdare unknowns. In Example 5.8, we present an estimator based on a specific training sequence design. In Example 5.9, we use properties of 4-QAM to develop a blind frequency offset estimator. We compare their performance to highlight differences in the proposed approaches inFigure 5.15. We also explain how to jointly estimate the delay and channel with each approach. These algorithms illustrate some ways that known information or signal structure can be exploited for estimation.

05fig15.jpg

Figure 5.15The mean squared error performance of two different frequency offset estimators: the training-based approach in Example 5.8 and the blind approach in Example 5.9. Frame synchronization is assumed to have been performed already for the coherent approach. The channel is the same as in Example 5.3 and other examples, and the SNR is 5dB. The true frequency offset isepsi.jpg= 0.01. The estimators are compared assuming the number of samples (Ntrfor the coherent case andNtotfor the blind case). The error in each Monte Carlo simulation is computed from phasee239-1.jpgto avoid any phase wrapping effects.

Example 5.8In this example, we present a coherent frequency offset estimator that exploits training data. We suppose that frame synchronization has been solved. Let us choose as a training sequencet[n] = exp(j2πftn) forn= 0, 1, . . . ,Ntr− 1 whereftis a fixed frequency. This kind of structure is available from the Frequency Correction Burst in GSM, for example [100]. Then forn= 0, 1, . . . ,Ntr− 1,

05equ71.jpg

纠正已知抵消引入的火车ning data gives

05equ72.jpg

The rotation bye−j2πftndoes not affect the distribution of the noise. Solving for the unknown frequency in (5.72) is a classic problem in signal processing and single-tone parameter estimation, and there are many approaches [330, 3, 109, 174, 212, 218]. We explain the approach used in [174] based on the model in [330]. Approximate the corrected signal in (5.72) as

05equ73.jpg

where θ is the phase ofhand ν[n] is Gaussian noise. Then, looking at the phase difference between two adjacent samples, a linear system can be written from the approximate model as

05equ74.jpg

Aggregating the observations in (5.79) fromn= 1, . . . ,Ntot− 1, we can create a linear estimation problem

05equ75.jpg

where [p]n= phase(ej2πftny*[n]e−j2πft(n+1)y[n+ 1]),1is anNtr− 1 × 1 vector, and ν is anNtr− 1 × 1 noise vector. The least squares solution is given by

05equ76.jpg

which is also the maximum likelihood solution if ν[n] is assumed to be IID [174].

Frame synchronization and channel estimation can be incorporated into this estimator as follows. Given that the frequency offset estimator in (5.77) solves a least squares problem, there is a corresponding expression for the squared error; see, for example, (3.426). Evaluate this expression for many possible delays and choose the delay that has the lowest squared error. Correct for the offset and delay, then estimate the channel as in Section 5.1.4.

Example 5.9In this example, we exploit symmetry in the 4-QAM constellation to develop a blind frequency offset estimator, which does not require training data. The main observation is that for 4-QAM, the normalized constellation symbols are points on the unit circle. In particular for 4-QAM, it turns out thats4[n] = −1. Taking the fourth power,

05equ78.jpg

where ν[n] contains noise and products of the signal and noise. The unknown parameterddisappears becauses4[nd] = −1, assuming a continuous stream of symbols. The resulting equation has the form of a complex sinusoid in noise, with unknown frequency, amplitude, and phase similar to (5.72). Then a set of linear equations can be written from

05年equ79.jpg

in a similar fashion to (5.75), and then

05equ80.jpg

Frame synchronization and channel estimation can be incorporated as follows. Use all the data to estimate the carrier frequency offset from (5.80). Then correct for the offset and perform frame synchronization and channel estimation based on training data, as outlined in Section 5.1.3 and Section 5.1.4.

InformIT Promotional Mailings & Special Offers

I would like to receive exclusive offers and hear about products from InformIT and its family of brands. I can unsubscribe at any time.

Overview


Pearson Education, Inc., 221 River Street, Hoboken, New Jersey 07030, (Pearson) presents this site to provide information about products and services that can be purchased through this site.

This privacy notice provides an overview of our commitment to privacy and describes how we collect, protect, use and share personal information collected through this site. Please note that other Pearson websites and online products and services have their own separate privacy policies.

Collection and Use of Information


To conduct business and deliver products and services, Pearson collects and uses personal information in several ways in connection with this site, including:

Questions and Inquiries

调查和问题,我们收集inquiry or question, together with name, contact details (email address, phone number and mailing address) and any other additional information voluntarily submitted to us through a Contact Us form or an email. We use this information to address the inquiry and respond to the question.

Online Store

For orders and purchases placed through our online store on this site, we collect order details, name, institution name and address (if applicable), email address, phone number, shipping and billing addresses, credit/debit card information, shipping options and any instructions. We use this information to complete transactions, fulfill orders, communicate with individuals placing orders or visiting the online store, and for related purposes.

Surveys

Pearson may offer opportunities to provide feedback or participate in surveys, including surveys evaluating Pearson products, services or sites. Participation is voluntary. Pearson collects information requested in the survey questions and uses the information to evaluate, support, maintain and improve products, services or sites, develop new products and services, conduct educational research and for other purposes specified in the survey.

Contests and Drawings

Occasionally, we may sponsor a contest or drawing. Participation is optional. Pearson collects name, contact information and other information specified on the entry form for the contest or drawing to conduct the contest or drawing. Pearson may collect additional personal information from the winners of a contest or drawing in order to award the prize and for tax reporting purposes, as required by law.

Newsletters

If you have elected to receive email newsletters or promotional mailings and special offers but want to unsubscribe, simplyemailinformation@informit.com.

Service Announcements

On rare occasions it is necessary to send out a strictly service related announcement. For instance, if our service is temporarily suspended for maintenance we might send users an email. Generally, users may not opt-out of these communications, though they can deactivate their account information. However, these communications are not promotional in nature.

Customer Service

We communicate with users on a regular basis to provide requested services and in regard to issues relating to their account we reply via email or phone in accordance with the users' wishes when a user submits their information through ourContact Us form.

Other Collection and Use of Information


Application and System Logs

Pearson automatically collects log data to help ensure the delivery, availability and security of this site. Log data may include technical information about how a user or visitor connected to this site, such as browser type, type of computer/device, operating system, internet service provider and IP address. We use this information for support purposes and to monitor the health of the site, identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents and appropriately scale computing resources.

Web Analytics

Pearson may use third party web trend analytical services, including Google Analytics, to collect visitor information, such as IP addresses, browser types, referring pages, pages visited and time spent on a particular site. While these analytical services collect and report information on an anonymous basis, they may use cookies to gather web trend information. The information gathered may enable Pearson (but not the third party web trend services) to link information with application and system log data. Pearson uses this information for system administration and to identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents, appropriately scale computing resources and otherwise support and deliver this site and its services.

Cookies and Related Technologies

This site uses cookies and similar technologies to personalize content, measure traffic patterns, control security, track use and access of information on this site, and provide interest-based messages and advertising. Users can manage and block the use of cookies through their browser. Disabling or blocking certain cookies may limit the functionality of this site.

Do Not Track

This site currently does not respond to Do Not Track signals.

Security


Pearson uses appropriate physical, administrative and technical security measures to protect personal information from unauthorized access, use and disclosure.

Children


This site is not directed to children under the age of 13.

Marketing


Pearson may send or direct marketing communications to users, provided that

  • Pearson will not use personal information collected or processed as a K-12 school service provider for the purpose of directed or targeted advertising.
  • Such marketing is consistent with applicable law and Pearson's legal obligations.
  • Pearson will not knowingly direct or send marketing communications to an individual who has expressed a preference not to receive marketing.
  • 适用的法律要求,表达或impli吗ed consent to marketing exists and has not been withdrawn.

Pearson may provide personal information to a third party service provider on a restricted basis to provide marketing solely on behalf of Pearson or an affiliate or customer for whom Pearson is a service provider. Marketing preferences may be changed at any time.

Correcting/Updating Personal Information


If a user's personally identifiable information changes (such as your postal address or email address), we provide a way to correct or update that user's personal data provided to us. This can be done on theAccount page. If a user no longer desires our service and desires to delete his or her account, please contact us atcustomer-service@informit.comand we will process the deletion of a user's account.

Choice/Opt-out


Users can always make an informed choice as to whether they should proceed with certain services offered by InformIT. If you choose to remove yourself from our mailing list(s) simply visit the following page and uncheck any communication you no longer want to receive:www.e-skidka.com/u.aspx.

Sale of Personal Information


Pearson does not rent or sell personal information in exchange for any payment of money.

While Pearson does not sell personal information, as defined in Nevada law, Nevada residents may email a request for no sale of their personal information toNevadaDesignatedRequest@pearson.com.

Supplemental Privacy Statement for California Residents


California residents should read ourSupplemental privacy statement for California residentsin conjunction with this Privacy Notice. TheSupplemental privacy statement for California residentsexplains Pearson's commitment to comply with California law and applies to personal information of California residents collected in connection with this site and the Services.

Sharing and Disclosure


Pearson may disclose personal information, as follows:

  • 按照法律的要求。
  • With the consent of the individual (or their parent, if the individual is a minor)
  • In response to a subpoena, court order or legal process, to the extent permitted or required by law
  • To protect the security and safety of individuals, data, assets and systems, consistent with applicable law
  • In connection the sale, joint venture or other transfer of some or all of its company or assets, subject to the provisions of this Privacy Notice
  • To investigate or address actual or suspected fraud or other illegal activities
  • To exercise its legal rights, including enforcement of the Terms of Use for this site or another contract
  • To affiliated Pearson companies and other companies and organizations who perform work for Pearson and are obligated to protect the privacy of personal information consistent with this Privacy Notice
  • To a school, organization, company or government agency, where Pearson collects or processes the personal information in a school setting or on behalf of such organization, company or government agency.

Links


This web site contains links to other sites. Please be aware that we are not responsible for the privacy practices of such other sites. We encourage our users to be aware when they leave our site and to read the privacy statements of each and every web site that collects Personal Information. This privacy statement applies solely to information collected by this web site.

Requests and Contact


Pleasecontact usabout this Privacy Notice or if you have any requests or questions relating to the privacy of your personal information.

Changes to this Privacy Notice


我们可以修改这个隐私通过updat通知ed posting. We will identify the effective date of the revision in the posting. Often, updates are made to provide greater clarity or to comply with changes in regulatory requirements. If the updates involve material changes to the collection, protection, use or disclosure of Personal Information, Pearson will provide notice of the change through a conspicuous notice on this site or other appropriate way. Continued use of the site after the effective date of a posted revision evidences acceptance. Please contact us if you have questions or concerns about the Privacy Notice or any objection to any revisions.

Last Update: November 17, 2020